ISTM 210 EXAM 4 2025/2026 ACCURATE QUESTIONS
WITH CORRECT DETAILED ANSWERS || 100%
GUARANTEED PASS <BRAND NEW VERSION>
Computer security .......Answer.........concerned with risk
management, confidentiality, integrity, and the availability of
electronic info that is processed and stored within a computing
system
Risk management .......Answer.........recognition, consequences, and
assessment of risks to a computer's assets and developing
strategies to manage and protect them.
Why is a computer extremely attractive to an intruder or
hacker? .......Answer.........It holds valuable info like credit card
numbers, passwords, bank acc info, music files and sensitive
business data.
,age 2 of 48
hacker or hacktivist .......Answer.........someone who attempts to
invade or disable a computer's security measure then steal the
computer resources at their leisure.
Not just after information, they try to hijack computer processing
cycles and speed as well as storage space.
unsecured computer .......Answer.........Easy to breach, especially
by seasoned hacker
connected to internet so they receive malicious emails with virus,
worms, and malware.
What is it better to assume? .......Answer.........that a computer will
be attacked regardless of security measures and to take
preemptive measures to prevent them rather than ignoring it.
,age 3 of 48
How do businesses take advantage of the internet?
.......Answer.........by setting up intranets
Intranet .......Answer.........A private version of the Internet that
works the same way, but it is confined within an organization.
Whats the key aspect of an intranet? .......Answer.........privacy
Firewall .......Answer.........specialized hardware and software
working together that ensures that only authorized personnel
and employees can use the intranet
without a firewall an intranet is just another part of the
___________ .......Answer.........internet
How is a firewall configured? .......Answer.........to deny or permit
network users, many times internet users, or data into a computer
network with different levels of trust.
, age 4 of 48
Proxy server .......Answer.........Any communications in or out of an
intranet pass through a special security computer as a
precaution to protect from any external threats.
How do firewalls control flow of data/info? .......Answer.........By
opening and closing ports for various transmission protocols like
http, email, ftp
Port .......Answer.........like a fire door, its used to contain and
delay structural fire from spreading to other buildings
What do standard security practices dictate? .......Answer.........a
"default-deny" firewall rule that the only network connections
that are permitted are the ones that are explicitly allowed
Disadvantage of "default deny" .......Answer.........requires
detailed understanding of network apps and endpoints required
for day to day operations